Cryptography

The Quantum Threat To Cybersecurity Is Closer Than You Think

As quantum computers edge closer to maturity, they are expected to break the encryption that underpins today’s internet, financial systems, and secure communica [...]
Published by : Dr Victor Mateu

Rethinking Secure AI: How PetalGuard Sets a New Benchmark for Federated Learning

Business leaders are wary. They urgently want to reap the benefits of Artificial Intelligence (AI), and yet many hesitate, because they worry about the security [...]
Published by : Petal Guard

How to Redefine AI Security with the PetalGuard Approach

In 2023, genetic testing giant 23andMe suffered a massive breach, exposing sensitive ancestral and health data of millions. Fast forward to today, and the compa [...]
Published by : Petal Guard

How to navigate the transition to post-quantum cryptography

Security professionals worldwide are preparing for a major upgrade in the form of a migration to new post-quantum cryptographic standards as the era of quantum [...]
Published by : Security Advisors ME

TII Advances UAE’s Leadership in Quantum‑Safe Security

Dr. Victor Mateu, Chief Researcher at the Cryptography Research Center, TII underscores how the institute’s work positions the UAE at the forefront of quantum‑s [...]
Published by : Security MEA

Opossum Attack

At TII, our latest research at the Cryptography Research Center has uncovered a fundamental vulnerability in how many application-layer protocols integrate with [...]
Published by : Technology Innovation Institute

The Exipnos Era: Striking a Balance between Searchability and Security

We have come a long way since the invention of cathode-ray tubes, magnetic drums, tape drives, and, for the older millennials out there, hard-disk drives. Colle [...]
Published by : Technology Innovation Institute

Strengthening Online Security with the TII McEliece Challenges

In our digital-first age, where the privacy and security of individuals and organizations are of paramount importance, cryptography plays a crucial role in safe [...]
Published by : Technology Innovation Institute

Building Resilient AI with CRC’s DNN Breakthrough

From speech recognition to facial identification, and healthcare innovation to autonomous vehicles, deep neural networks (DNNs) are certainly enjoying the spotl [...]
Published by : Technology Innovation Institute

Attacks and defenses in post-quantum cryptography: case of lattices.

In the digital age, where every online interaction, from messaging to financial transactions, hinges on the assurance of security, the role of cryptography cann [...]
Published by : Technology Innovation Institute

Navigating the Quantum Frontier: The Arrival of NIST's First Post-Quantum Cryptography Standards

The dawn of the quantum age is not a question of "if" but "when". Quantum computers, leveraging the bizarre yet powerful principles of quantum mechanics, are se [...]
Published by : Technology Innovation Institute

Post-quantum cryptography: Preparing for a digitally secure future

In 1994, Peter Shor introduced a revolutionary algorithm that posed a theoretical threat to the public-key cryptography systems we’ve relied on for decades to s [...]
Published by : Technology Innovation Institute